I used Squidguard at my prior company and it was a fairly easy system to manage. However, my old company was a Linux shop and my current environment is heavily Microsoft-leaning. Can a rogue Linux server be implemented in this environment without wreaking havoc on our team?
I read about Hershey’s web site compromise in this morning’s paper: “Hacker targets Hershey recipe”, and couldn’t help but wonder, why? Why hack into a website, only to change a recipe involving chocolate? What’s the point? Clearly, there may be more to the story than we know. The movie-watching, suspicious part of me speculates that… Read More »
Recently I’ve seen many articles discussing the issue of tech-savvy users and their impact on the future role of the corporate IT/IS department. After all, why require an IT department, when users will simply implement and support their own gadgets? This is a valid argument, but it’s not new. Over the past 30 years working… Read More »
Most people hate change, and with good reason — change isn’t always comfortable. It often requires us to go outside our comfort zone and try things that take more-than-average effort. As info-tech professionals, we’re often agents of change. I rarely see people react to change with open arms and a smile. More likely, change is greeted warily — or with outright hostility. Why is change so difficult?
What’s the primary problem with social media security? A lack of security awareness among social media users. So many people use social media without thinking about the ramifications.
Today‘s post comes from Jim Manico, Web Application Architect, Senior Application Security Engineer, and All-Around Great Guy. I’ve worked with Jim on several fairly large web projects and he always comes through with quality work! You can check out Jim’s full blog at: manicode.blogspot.com Sincere congratulations to the entire Mozilla team. For the first time… Read More »